Data Center Management

The data center management community focuses on the holistic management and optimization of the data center. From technologies such as virtualization and cloud computing to data center design, colocation, energy efficiency and monitoring, the BrightTALK data center management community provides the most up-to-date and engaging content from industry experts to better your infrastructure and operations. Engage with a community of your peers and industry experts by asking questions, rating presentations and participating in polls during webinars, all while you gain insight that will help you transform your infrastructure into a next generation data center.

Hyper-converged storage is turning out to be the buzz phrase of the storage industry in 2015, one with as many confusing and contradictory definitions as there are vendors. In theory, the combining of server and storage tiers into a single entity should deliver better application performance and lower infrastructure costs. In practice, your mileage will vary.

Join us for this webinar where industry expert Jon Toigo – chairman and co-founder of the Data Management Institute – will help to identify key criteria for making the right infrastructure decision for your business. Mr. Toigo will offer his key criteria in selecting a hyper-converged infrastructure model and he will survey the offerings of leading vendors to identify the “gotchas,” trade-offs and lock-ins of each option so you find the best fit for your company.

Network Managers have a tall order in IT organizations today. Typically, they are tasked with two conflicting business directives:

1. Deliver optimal end-user experience for networked applications

2. Reduce the operational cost of the network, or reduce the IT budget

But the knee jerk approach of “throwing bandwidth at the problem” while potentially improving end user experience, is hardly the answer to cost management and network optimization.

In this webinar, Chris Greer will discuss the challenges that result from the common approaches utilized today in capacity planning and, outline a new way, comprised of 4 actionable steps to optimizing the bandwidth you may already have.

In this 50 minute webinar we'll explore how modern SaaS, PaaS and IaaS systems are achieving unprecedented levels of scale and performance by implementing In-Memory Computing (IMC) technologies. We'll cover which types of services will benefit most from IMC, how IMC compares to alternative technologies, and how to get started evaluating this game-changing technology.

This webinar is a must-see for technology leaders in the transition to high-speed, low-latency Saas, PaaS or IaaS services. Register Now.

Mobile Edge Computing (MEC) provides a new ecosystem and value chain in mobile networks. The Open-RAN ecosystem enables Mobile Operators to open their Radio Access Network (RAN) edge to authorized third-party applications and services. By transforming proximity, context, agility, rapid response time and speed into value for mobile users, mobile operators, network equipment vendors, and third-party providers can improve the customer experience and monetize mobile broadband. The MEC trend is gaining momentum with the establishment of an ETSI MEC Standardization group led by Intel, Nokia, Huawei and other major players.

In the Webinar, we will present the MEC architecture within the mobile network and demonstrate a number of use cases
-Leveraging the Open-RAN ecosystem to bring 3rd party applications like Content Delivery Networks (CDNs) to the Radio Edge;
-Demonstrating the value of real-time network awareness for optimized content delivery;
-And presenting advanced RAN-based technologies that further accelerate content delivery

As companies explore how they can leverage OpenStack to advance their business, they often ask if OpenStack is really “production-ready.” Through co-founding OpenStack, running one of the world’s largest OpenStack clouds, and managing OpenStack private clouds for enterprises, we know what is takes to make OpenStack production-ready. In this session, Justin Shepard, a Rackspace distinguished architect, will discuss what it means to be "production-ready" and how we designed Rackspace Private Cloud Powered By OpenStack to run production workloads. Register today to join this insightful and informative discussion.

Private cloud deployments are going mainstream. The problem is that VM visibility and DNS, DHCP, and IP address management automation are still a huge challenge that can cause delays, manual work, and errors. Those days are over. Watch this webinar and learn how you can be enabled to put your private cloud networking on auto-pilot. See the next generation of network automation for cloud and virtual environments to help simplify your private cloud deployment.

The New IP is the next dimension in networking. In this webcast, Simon Williams from Brocade and Clive Atkins from Redcentric discuss how the new IP will put customers in control of their own networks allowing them to evolve their networks on their time, their terms.

If you run more then one solution when backing up and recovering your data it can be hard to keep track of which solution does what. Check out how our single solution can fill in all the gaps and make it less complicated to manage multiple solutions at one time.

Modern performance tools and techniques can dramatically improve the user experience, reduce developer and ops frustration, lead to better utilization of infrastructure and allow you to smartly ship products to market faster.

Working with many companies across all industries, we recognize the pitfalls and barriers to adopting DevOps. The Rackspace DevOps Automation team works with various tools every day to counteract these pitfalls. Join Product Manager @EricBrinkman as he shows you the technologies our DevOps Automation team uses, provide insight as to why they were chosen, and walk through a customer experience demo.

This webinar will include:
•Deploying Magento through UI and pushing code
•A look into the control panel
•Demo of New Relic and Chef
•Simulation of Rackspace customer experience

The arrival of mass-storage services, the emergence of analytics applications and the adoption of Object Storage by the cloud-services industry have provided an impetus for new storage hardware architectures. One such underlying hardware technology is the Ethernet connected hard drive, which is in early stages of availability.

Join this Webcast to hear Chris DePuy, Vice President of Dell’Oro Group, share findings from interviews with storage-related companies, including those selling hard drives, semiconductors, peripherals and systems. Chris will present some common themes uncovered, including:
•What system-level architectural changes may be needed to support Ethernet connected drives
•What capabilities may emerge as a result of the availability of these new drives
•What part of the value chain spends the time and money to package working solutions
This Webcast will also present some revenue and unit statistics about the storage systems and hard drive markets and will discuss potential market scenarios that may unfold as a result of the Object storage and Ethernet connected drive trends.

Inflexible, constrained, locked in, dependent are all terms we hear used to talk about the IT solutions being used in today’s datacenters. Datacenters are complex with a variety of physical, virtual, and cloud platforms for both computing and storage. Solutions that promise to make a datacenter more manageable, often lock you in to specific platforms or singular processes.

Join this session with Andy Ebbs to learn about the top 10 technical capabilities needed to ensure that you are able to freely move your workloads to run on the best platform, and protect them wherever they are running.

So you have been tasked to find a DCIM solution for your organization. There's only about a hundred of them, so that sounds like fun!

Before you plunge into mind-numbing RFP writing, join Jason Sherman, Director of Sales Engineering at Graphical Networks as he provides valuable tips and tricks of the trade that can save you time and energy.

We'll go over some of the aspects that may be forgotten in the RFP writing process as well as requirements for a meaningful proof of concept, and other important things to consider when evaluating a DCIM software tool.

Join us for this informative 60 minute roundtable as we discuss how private and hybrid clouds fit into the modern datacenter. This panel includes top luminaries from major private and hybrid cloud providers. Some of the questions we will be asking include: Why use private and hybrid clouds instead of public clouds? Are all workloads suitable for these types of clouds? What are the economic factors that play into these types of clouds? Are they a transitional technology or the new normal?

With more than 100 applications in production, a leading bank needed to reduce the time required to deploy and update its apps. By implementing an automation solution from HP, the bank reduced the application time-to-deploy by nearly 8X. Now the bank follows a seamless and standardized approach for deployment.

As organizations recognize that compliance is a challenge that is no longer optional, they are also having to closely monitor relevant laws & regulation changes.
Compliance requirements differ depending on where you operate and so multi-nationals have to consider US, EU and APJ legislation which is complex and often misaligned.
With the various cloud computing offerings it is important to address security and privacy as part of good governance, risk management and due diligence. Failure to adequately handle these requirements can place the organization at significant risk for not meeting compliance obligations and exposing sensitive data to possible data breaches. This session provides an introduction to data privacy definitions and issues as well as identifying key legislation across APJ.

So many companies drown in spreadsheets and duplicate diagrams when trying to document IT infrastructure, but there are better ways. This webinar will cover simple methods and techniques to reduce effort and improve quality of network, data centre and systems documentation. The aim is to achieve a baseline of complex environments which is updated and maintained by change processes.

Join us for a fast-paced and informative 60-minute roundtable as we discuss one of the hottest topics in the datacenter: VMware vSphere Virtual Volumes (VVOLs). VVOLs is the industry's first solution to enable native virtual machine-awareness across a broad range of SAN/NAS arrays. VVOLs will be packaged as a feature in VMware vSphere Standard Edition and above as well as in VMware vSphere ROBO editions, and is seeing a groundswell of interest from IT professionals, especially those involved in datacenter operations. The panel includes VVOL experts from four major vendors that have announced they will be implementing VVOLs into their storage. Some of the questions we will be asking them include: What immediate impact will VVOLs have on the datacenter? What should the early adopters look for in a VVOL-based storage solution? Should datacenters start to implement VVOLs right away or wait for VVOL.next?

Would you ever consider leaving your house for the day without locking your door? Of course not!!
It is as important to protect and control front-door access of your databases as it is to lock the front door of your house. That is why we use a suite of database discovery and activity monitoring tools to control the front door access of our databases. Yet hackers and miscreant insiders know that the back door of databases are all too often left wide open—and it is the path of least resistance to steal valuable data.

Vormetric has partnered with Intel Security to integrate with McAfee Database Activity Monitoring (DAM) and McAfee Enterprise Security Manager (ESM) to extend data-security coverage. Vormetric adds another layer of security to McAfee DAM by preventing unauthorized users and processes from accessing or viewing the database files through transparent encryption.

In this presentation, Vormetric will demonstrate:
• How to complete database security, to assure that back door entry is as locked down as the front door
• How to protect the database, and its associated files such as configuration, logs and reports, from not only physical theft, but also from insider threats and hackers

When organizations are looking at a phone system, they have two paths they can take — upgrading their entire on-premise equipment in each office or evaluate a cloud-based system. Marty Piombo, VP of Partnership Development at RingCentral, discusses what it takes to transition to a phone system in the cloud and the benefits it can provide.

What's New at FalconStor!
True Software Defined Storage.
How Intelligent Abstraction merges legacy and modern infrastructure for optimized IT processes.
Rethinking how we provision, protect, and recover data resources, and how that impacts your business.

As enterprises struggle to control and secure their assets across internal file stores, an ever-increasing universe of mobile devices, and a plethora of non-secure cloud storage services, they are searching for solutions that allow them to quickly identify and isolate noncompliant data sharing and prevent unauthorized access to sensitive information.

Intel Security and Topia Technology have partnered to develop an integrated product for organizations to store, analyze and share documents from a mobile device or a cloud computing platform.

The proliferation of data on mobile devices has created huge headaches for CIOs as they attempt to protect data, stay in compliance and move workloads to the cloud. How IT approaches data protection for mobile devices can support or hinder these high level efforts. Endpoint backup, traditionally viewed as a functional requirement below the radar of CIOs, is evolving to offer not just data backup and restore, but also a modern way to address costly data governance challenges such as compliance and eDiscovery. This webcast will cover real-world case studies of Fortune 1000 companies leveraging endpoint backup solutions to gain significant business advantages including cost control, compliance and embracing the cloud.

For the past 18 months, the technology trade press has been filled with articles by vendors and analysts proclaiming the emergence of an entirely new conceptualization of storage infrastructure: software defined storage. In this webinar, IT-SENSE editor, Jon Toigo, looks at the realities of virtual SANs from leading hypervisor vendors – their capabilities and limitations – and how they may be missing the storage requirements of smaller firms and companies that need to support remote and branch offices. Joining Toigo will be Anatoly Vilchinsky, Head of Support for StarWind Software, an early mind share leader in virtual SAN technology.

More than 75% of organizations in the U.S. and U.K. have experienced at least one DNS attack according to SC Magazine. DNS Attacks are increasing in frequency and evolving constantly. They range from common amplification, reflection, and flood attacks to more sophisticated and stealthier types. These might have fancy names like random subdomain, phantom domain, and domain lock-up, but their effects on DNS are far from pretty. Join this webinar as we reveal the top 10 attacks on external and internal DNS servers; and the impact they have on your operations.

Most organisations are investigating moving some internally hosted services to cloud service providers such as Amazon Web Services, Colt, Sungard, Century Link, to increase agility and reduce complexity. The key to this for all service providers is data centre automation. OpenStack is a Cloud Operating System that can help you quickly build and automate your own Cloud Infrastructure and gain the benefits of automation and agility it brings.

There are many choices to make when building your OpenStack environment. Andy will introduce OpenStack, then review in detail the storage choices that need to be made. He will look at how SolidFire Agile Infrastructure for OpenStack simplifies and dramatically reduces OpenStack project deployment times.

Join our Webinar to learn about two new software appliances in 6WIND’s Speed Series family: Turbo Router and Turbo IPsec. Based on 6WINDGate™ packet processing software, which is deployed in Tier 1 networks worldwide, Turbo Router and Turbo IPsec can be installed quickly onto standard x86 servers within bare metal and virtual machine (VM) environments. The new Speed Series Turbo Appliances are designed to benefit Service Providers, Cloud and Content Providers and Enterprises with the best price/performance ratios when transitioning from hardware to software based appliances for flexibility, efficiency and cost savings. Compared to competing software routers, 6WIND’s Turbo Router can deliver up to twice the performance at ¼ the price. Compared to hardware-based IPsec Gateways, 6WIND’s Turbo IPsec can save 80% of the cost per gigabit of IPsec throughput.

The Fastest, Easiest Way to Backup and Store Data—so You Can Do More Important Things

Are you still spending too much time backing up and storing data rather than using that information to drive business innovation? If so, it just might be time to consider an all-in-one backup target appliance (BTA).

Join us as Seagate appliance experts Anne Haggar and Samuel Nagalingam will help you answer these important questions:

1. Why are backup target appliances gaining steam in the market?
2. How do you know if a BTA is right for you?
3. How can Seagate’s BTA solve the problems you have managing your information and backing up enterprise applications?

After taking a high-level look at the latest trends in BTA technology, Anne and Samuel will introduce you to the powerful, all-new Seagate Backup Target Appliance—an all-in-one solution that provides an onsite backup point for your most important information, let’s you optionally run the EVault Director Backup and Recovery Software, and allows you to replicate to another BTA or to the cloud.

Find out how you can protect the information that matters most—wherever it resides—freeing you to use the information to drive innovation.

Join us on Thursday, April 16, 2015 at 11:00 AM PST/2:00 PM EST for this follow-up webinar to the Introduction to Apache Ignite(TM) (incubating) webinar, in which GridGain co-founder and EVP of Engineering, Dmitriy Setrakyan will take a deep dive into several coding examples so attendees can see directly some of the powerful capabilities of the Apache Ignite(TM) (incubating) In-Memory Data Fabric and just how easy it is to implement.

Do you have network performance monitoring tools, but you still can’t figure out what the problem is? Are you experiencing VERY expensive downtime, resulting in customer churn? Do your IT organizations spend all their time pointing fingers? Do you want it to end? Attend this webinar on how to accelerate the mean-time-to-repair for network performance problems, without an actual war in the war room.

Measuring performance of Solid State requires different approaches, tools and methodologies to accurately model characteristics of the data sets, access patterns, and data streams. The SNIA Solid State Storage System (S4) TWG was created for the purpose of addressing the unique performance behavior of solid state storage systems. Join Leah and Peter as they provide the guidelines that are vendor agnostic and will support all major solid state storage system technologies.

Generally, risks associated with continuity planning, from physical to cyber-security, are part of an ever-evolving threat to our systems and technologies. Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. What are some of the risks associated with continuity planning? Why is managing risk important for continuity? What are some of the methods used to mitigate risks in continuity planning?

The COOP presentation will provide an understanding of Continuity and Continuity of Operations, explain the importance of a viable Continuity capability, and emphasize the need for a viable Continuity capability in all organizations, to demonstrate some of the linkages between continuity programs and: